Limit search to available items
Book Cover
E-book

Title Frontiers in hardware security and trust theory, design and practice edited by Chip Hong Chang, Yuan Cao
Published Stevenage The Institution of Engineering and Technology 2020
©2021

Copies

Description 1 online resource illustrations
Series Materials, circuits and devices 66
Materials, circuits and devices series ; 66.
Contents IP/IC piracy threats of reversible circuits / Samah Mohamed Saeed -- Improvements and recent updates of persistent fault analysis on block ciphers / Fan Zhang, Bolin Yang, Guorui Xu, Xiaoxuan Lou, Shivam Bhasin, Xinjie Zhao, Shize Guo, and Kui Ren -- Deployment of EMC techniques in design of IC chips for hardware security / Makoto Nagata -- Hardware obfuscation for IP protection / Abdulrahman Alaql, Md Moshiur Rahman, Tamzidul Hoque, and Swarup Bhunia -- Formal verification for SoC security / Jiaji He, Xialong Guo, Yiqiang Zhao and Yier Jin -- Silicon-based true random number generators / Yuan Cao, Egbochukwu Chukwuemeka Chidiebere, Chenkai Fang, Mingrui Zhou, Wanyi Liu Xiaojin Zhao, and Chip-Hong Chang -- Micro-architectual attacks and countermeasures on public-key implementations / Sarani Bhattacharya and Debdeep Mukhopadhyay -- Mitigating the CacheKit attack / Mauricio Gutierrez, Ziming Zhao, Adam Doupé, Yan Shoshitaishvili, and Gail-Jon Ahn -- Deep learning network security / Si Wang and Chip-Hong Chang -- Security implications of non-digital components / Xiaoxi Ren, Xhe Zhou, Di Tang, and Kehuan Zhang -- Accelerating homomorphic encryption in hardware : a review / Truong Phu Truan Ho and Chip-Hong Chang -- Information leakage from robust codes protecting cryptographic primitives / Osnat Keren and Ilia Polian -- Confidential and energy-efficient cognitive communications by physical-layer security / Pin-Hsun Lin and Eduard A. Jorswieck -- Physical-layer security for mmWave massive MIMO communications in 5G networks / Ning Wang, Long Jiao, Jie Tang, and Kai Zeng -- Security of in-vehicle controller area network : a review and future directions / Zhaojun Lu, Qian Wang, Gang Qu, and Zhenglin Liu
Summary The book consists of 15 chapters dealing with the following subjects: hardware security threats; IP/IC piracy threats of reversible circuits; persistent fault analysis on block ciphers; EMC techniques in design of IC chips; hardware obfuscation for IP protection; formal verification for SoC security; silicon-based true random number generators; micro-architectural attacks and countermeasures on public-key implementations; CACHEKIT attack mitigation; deep learning network security; nondigital components; homomorphic encryption; information leakage from robust codes protecting cryptographic primitives; confidential and energy-efficient cognitive communications; physical-layer security; mm-wave massive MIMO communications in 5G networks; and in-vehicle controller area network
Analysis hardware security
hardware trust
IP piracy threats
IC piracy threats
reversible circuits
persistent fault analysis
block ciphers
EMC techniques
IC chip design
hardware obfuscation
IP protection
formal verification
SoC security
silicon-based true random number generators
microarchitectural attacks
public-key cryptography
CACHEKIT attack mitigation
deep learning network security
nondigital components
homomorphic encryption
information leakage
robust codes
cryptographic primitive protection
confidential cognitive communications
energy-efficient cognitive communications
physical-layer security
mm-wave massive MIMO communications
5G networks
in-vehicle controller area network
Bibliography Includes bibliographical references and index
Notes Description based on online resource; title from PDF title page (IET Digital Library , viewed on March 17, 2021)
Subject Computer security.
Internet of things.
Cell phone systems.
Cognitive radio networks.
Computer software -- Verification.
Industrial property.
Integrated circuits.
Machine learning.
Neural networks (Computer science)
Computer Security
Neural Networks, Computer
Machine Learning
Internet of things
Computer security
Cell phone systems
Cognitive radio networks
Computer software -- Verification
Industrial property
Integrated circuits
Machine learning
Neural networks (Computer science)
5G mobile communication
cognitive radio
controller area networks
formal verification
industrial property
integrated circuits
learning (artificial intelligence)
MIMO communication
neural nets
random number generation
security
trusted computing
Form Electronic book
Author Chang, Chip-Hong, editor
Cao, Yuan, editor
ISBN 1785619284
9781785619281